Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science

Size: px
Start display at page:

Download "Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science"

Transcription

1 FORENSIC SCIENCE JOURNAL SINCE 2002 Forensic Science Journal 2017;16(1):19-42 fsjournal.cpu.edu.tw DOI: /FSJ Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science Wen-Chao Yang 1*, Ph.D. ; Long-Huang Tsai 1, B.S. ; Chung-Hao Chen 2, Ph.D. 1 Department of Forensic Science, National Central Police University, Taoyuan City, Taiwan 2 Electrical and Computer Engineering Department, Old Dominion University, Norfolk, VA, U.S.A. Received: August 28, 2017; Accepted: September 30, Abstract With the rapid development of digital technologies, cameras and video recorders play an important role in our life, such as cell phones, cameras, or vehicle recorders. As a result, the easier we can access to those imaging devices, the more likely a perpetrator can use it to commit a crime, such as the invasion of privacy. Therefore, in recent years digital images and videos often play an important role as an evidence for coming a crime in court. Due to the rapid development of cloud and network technologies, we can easily spread digital images and videos via or social media. However, it is difficult for us to trace the origin of the digital image/video contents. In many crime events, such as spreading national secrecy or maliciously spreading privacy cases, the ability of determining the source of the digital image/ video contents is important. In this paper, an origin-tracing method based on sensor noise is proposed to tackle this issue. The experiment result shows that the classification accuracy is close to 100 percent in some cases. Keywords: digital image/video evidence, tracing origin, authentication, sensor noise Introduction Due to the rapid development of computer science and technology, the use of digital imaging devices has incredibly become popular. Digital imaging devices, such as cell phones, cameras, or vehicle recorders, have become commodity for everyone. It lets the offenders easily commit crimes, such as intrusion of privacy or cyber bullying using digital cameras or mobile phone cameras. In addition, due to the lack the appropriate method of tracing origin of digital images/videos, it is difficult for us to identify the original imaging device when the offenders use to spread digital images and videos using or social network methods. As a result, it becomes a challenging problem to use those images/videos as a legitimate evidence in court. Camera model identification is a technique to determine the camera model used to acquire a digital image of unknown provenance. It is based on the * Corresponding author: Wen-Chao Yang, Department of Forensic Science, National Central Police University, Taoyuan City, Taiwan. una135@mail.cpu.edu.tw

2 20 Forensic Science Journal 2017; 16(1) premise that images acquired by the same camera model share common characteristics. In this paper, we illustrate our proposed method based on sensor noise can trace the origin. More than 2000 photos acquired by six cameras and seven mobile phone cameras are used in our experiment to demonstrate the effectiveness of our proposed method. Related Works and Proposed Methods The researches of camera model identification can be divided into two categories based on whether embedded information is active or passive. For an active embedding method, it embeds the distinguishing characteristics in images (videos). Metadata analysis [1] and data hiding methods [2,3] belong to this. The Color Filter Array (CFA) interpolation artifacts [4,5], sensor dust [6], and PRNU [7-13] are considered as a passive detection method. For a metadata analysis, the JPEG or TIFF images in current digital cameras usually follow standards like TU-T T.81, JETF, EXIF, CIFF and DCF [1]. Thus, the resulting images can be used to describe imaging equipment, such as shooting conditions (Fig. 1) or GPS information (Fig. 2). However, there exists risk using metadata analysis to trace the source, because the metadata record of images is easy to be removed or modified, which has to carefully confirm the accuracy and integrity of the description. Fig. 1 A shooting condition example in EXIF file header [1].

3 Camera Identification Technique 21 Fig. 2 A GPS information example in EXIF file header [1]. The use of watermarking technology for imaging equipment to trace origin or verify the integrity is widely studied [2]. Blythe and Fridrich [3] proposed a lossless watermarking combined with photographer s iris information to verify the photographer and ensure the integrity of images. However, this technology is limited to patent rights and market demand, and are not widely applicable to all digital imaging devices. The work of passive detection methods, in contrast to active embedding methods, is recently developed. In 1999, Kurosawa et al. [7] first proposed that the nonuniformity or defects can be retained in the chargecoupled devices (CCDs) in the photosensitive element manufacturing process. It can be used like a fingerprint feature to identify the image of the lens in the study. This situation is as identical as bullet scratches allowing forensic analysts to match a bullet to a particular barrel or gun for tracing the gun owner. They used 9 video recorders which have four kinds of labels in the experiment. The results found that 8 of the video clips produced by the video camera can get the source of the lens. In addition, the image noise obtained by the experimental video recorder is different. In 2011, they [8] used the Bayesian framework to establish the approximate proportion of the ratio (likelihood ratio) based on the noise characteristics of the recorders. Lukas et al. conducted a series of studies on analysis of digital cameras based on PRNU in 2005 [9,10] and 2006 [11]. In [9] and [10], they used the Daubechies 8 wavelet (db8) filter to estimate noise and used the correlation coefficient for digital camera sources to make a comparison of 9 different digital cameras (see Table 1) and 2 file formats (TIFF and JPEG), the results are shown in Fig. 3 and Fig. 4.

4 22 Forensic Science Journal 2017; 16(1) Table 1 Cameras and properties used in experiments [9]. Camera brand Sensor Maximal resolution Image format Canon PowerShot A10 1/2.7-inch CCD JPEG Canon PowerShot G2 1/1.8-inch CCD CRW, JPEG Canon PowerShot S40 1/1.8-inch CCD CRW, JPEG Kodak DC TIFF, JPEG Olympus Camedia C765 UZ-1 1/2.5-inch CCD TIFF, JPEG Olympus Camedia C765 UZ-2 1/2.5-inch CCD TIFF, JPEG Nikon D mm Nikon DX CCD NEF-RAW, TIFF, JPEG Sigma SD mm CMOS-Foveon X X3F-RAW Olympus Camedia C3030 1/1.8-inch CCD TIFF, JPEG Fig. 3 Noise correlation from Olympus C765 (left) TIFF and Olympus C3030 (right) JPEG images with 9 reference patterns [9]. Fig. 4 Noise correlation from Canon G2 (left) and Nikon D100 (right) TIFF images with 9 reference patterns [9].

5 Camera Identification Technique 23 In both [9] and [10], they divided the noise into two main components [11], the fixed pattern noise (FPN) caused by dark currents and the photoresponse nonuniformity noise (PRNU) caused by pixel nonuniformity primarily. FPN primarily refers to the pixel-to-pixel difference when the sensor array is not exposed to light and its relationship to the exposure time and temperature. PRNU is caused by the inhomogeneity of the response of the light-sensitive element itself. They also proposed the mathematical model of image acquisition, according to the digital camera traceability analysis, the formula is shown as follows: y ij = f ij ( x ij + η ij )+c ij + ε ij (1) where i, j denote the coordinates of the image, i = 1,, m, j = 1,, n, m n is the resolution image, y ij and x ij respectively denotes the output and input of the capture sensor, η ij denotes the shot noise, c ij denotes the dark current, ε ij denotes the additive random noise, and the factors f ij are typically close to 1. In [11], they used the wavelet filter proposed in [12] as the denoise filter, and used different Garmma correction coefficients and compression ratios to analyze the sensor pattern noise in 9 different digital cameras (shown as Table 1). The experimental result is shown in Table 2. In Table 2, t denotes the correlation coefficient threshold used to distinguish the origin of images. FAR denotes the false acceptance rate and FRR denotes the false rejection rate. Table 2 Experimental results with FAR=10-3 [11]. Processing Camera None Gamma 0.7 Gamma 1.4 t FRR t FRR t FRR Nikon C C G S Sigma Kodak C A Processing Camera JPEG 90 JPEG 70 JPEG 50 t FRR t FRR t FRR Nikon C C G S Sigma Kodak

6 24 Forensic Science Journal 2017; 16(1) In 2009, Khanna et al. [13] used Daubechies 8 wavelet (Db8) filter as the denoise filter to estimate the imaging sensor pattern noise in 10 different cameras (shown in Table 3). They also use different size coefficients and file format conditions (see Table 3) to analyze the imaging sensor pattern noise. The experimental results are shown in Fig. 5 and Fig. 6. Table 3 Devices with respective setups for experiment[13]. Device Brand CCD Sensor Sensor Resolution Max. Picture Size Image Format c1 Canon PowerShot SD /2.5 inch 3.2 MP JPEG c2 Canon PowerShot SD /2.5 inch 3.2 MP JPEG c3 Nikon Coolpix /1.8 inch 7.1 MP JPEG c4 Panasonic DMC-FZ20 1/2.5 inch 5 MP JPEG/TIFF c5 Nikon Coolpix /2.5 inch 4 MP JPEG c6 Nokia 6630 (3G smartphone) JPEG c7 Olympus E-10 2/3 inch 4 MP JPEG/TIFF c8 Olympus D-360L JPEG/TIFF c9 Panasonic Lumix DMC-FZ4-1 1/2.5 inch 4 MP JPEG/TIFF c10 Panasonic Lumix DMC-FZ4-2 1/2.5 inch 4 MP JPEG/TIFF Fig. 5 Identification of low resolution (1024*768) c1 Canon SD200-1 images [13]. Fig. 6 The correlation values for various denoised images from c2 Canon SD200-2 images: the original images (left), the denoise images (right) [13].

7 Camera Identification Technique 25 In this paper, we apply the camera identification technique based on sensor noise in forensic science and propose an origin-tracing method based on foregoing research. The mathematic model is proposed as following: Y i = X i +Φ i + C i + ε i, (2) where Y i denotes the i-th output image, X i denotes the light information inputs for sensor in the i-th image, Φ i denotes the sensor noise (includes PRNU) in the i-th image, C i denotes the dark current in the i-th image, ε i denotes the random noise in the i-th image. We extract the noise pattern template as follows: Y' i = f d ( Y i ), (3) Y ' i denotes the i-th output image after denoise processing, f d (.) denotes the denoise function. N i = Y' i - Y i = Φ i + C i + ε i, (4) where N i denotes the noise in the i-th image. Because the ε i denotes the random noise in the i-th image, we assume it as a Gaussian random noise with zero mean, E ( ε i ) =0. Therefore, we obtain the noise pattern template N. N= E ( N i )=E ( Y' i - Y i )=Φ+C. (5) Experimental Results This section presents the experimental result of the camera identification technique based on sensor noise in different imaging devices. Digital cameras and mobile phones are used to verify the performance of our proposed camera identification technique. The list of digital cameras in the forensic science laboratory in Central Police University is shown as Table 4. The list of mobile phones is shown as Table 5. The noise pattern analysis algorithms were developed using Matlab 7. The Pearson correlation measure is used to as an evaluation measure to trace origin of digital photos. The testing platform is Microsoft Windows 7, Intel Core Duo 1.66 GHz with 2 GB memory. Table 4 The list of digital cameras in the experiment. Cameras No. Label Serial Number D80-1 Nikon D80 Digital SLR Camera D80-2 Nikon D80 Digital SLR Camera D90-1 Nikon D90 Digital SLR Camera D90-2 Nikon D90 Digital SLR Camera D Nikon D7000 Digital SLR Camera D Nikon D7000 Digital SLR Camera Camera Lens Serial Number Nikon 28-85mm f/ AF Nikkor Table 5 The list of mobile phones in the experiment. Label ASUS ZenFone 2 Laser (ZE550KL) ASUS ZenFone 2 ZE551ML-1 ASUS ZenFone 2 ZE551ML-2 HTC butterfly X920D Oppo r7sf Sony Xperia Z5 Sony Xperia Z5P Serial Number GCAZCY004318KMK F9AZFG F9AZFG FA33CPN c0cec4 BH903M6L4Z CB5A29R5F7

8 26 Forensic Science Journal 2017; 16(1) Digital cameras Six DSLR cameras with 3 focal length types (28mm, 50mm, and 85mm of the same camera lens) are combined into 18 different experiment samples (shown as Table 6) used in this experiment. We use the same shooting conditions, auto-mode, ISO 400, and Large JPEG (FINE) store format, to take more than 200 pictures for each experimental sample. The themes includes portrait and landscape shots. Afterwards, those photos are randomly divided into two groups, one for training noise pattern template, and the other group is used to validate the performance of our proposed method. We use the Daubechies 8 wavelet (Db8) filter and the Wiener filter as the denoise filter to extract the sensor noises. The experimental results are given in Appendix A. Table 6 The list of samples for digital cameras. Cameras No. Focus Length Experiment Samples ID D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D From the experimental result, we find out the Wiener filter is a better tool as a denoise filter for our proposed method to extract the sensor noise pattern. In addition, the focus length is also a factor to trace origin based on sensor noise pattern. In conclusion, according to the experimental result, the performance of the proposed is able to trace each origin based on sensor noise pattern with the threshold of correlation coefficient value. Mobile phones As the foregoing description, 7 different mobile phones (shown as Table 5) are used in this experiment. We use the shooting conditions, auto-mode and JPEG file format, to take more than 80 pictures for each device. Those themes include portrait and landscape shots. Then, we use the Wiener filter as the denoise filter to

9 Camera Identification Technique 27 extract the sensor noises. The experimental results are given in Appendix B. From the experimental result, we find out the performance of our proposed is able to trace each origin in mobile phone cameras with the threshold of 0.05 correlation coefficient value. Moreover, from the experimental result (Fig. B-6 and Fig. B-7), we can see that the sensor noise patterns in Sony Xperia Z5 and Sony Xperia Z5P have the same classification characteristics. Conclusions In this paper, the noise extraction mathematic model of sensor noise based camera identification technique is proposed. We also apply the sensor noise based camera identification technique to trace origin of digital photos in forensic science. Six DSLR cameras and seven mobile phone cameras are used in the experiment. The experimental results are shown that the proposed method has a good performance to trace origin of the experimental photos. In other word, we can find out the linkage between the photo and its capture device using just photo content by the proposed method. In our future work, we will add large devices to make an experiment to verify the generality of the proposed method. In addition, we will extend the proposed method to video evidence. Acknowledgements The authors would like to thank the anonymous reviewers for their insightful comments and valuable suggestions. This work was supported by National Science Council, Taiwan (MOST E ). References 1. Cohen K. Digital still camera forensics. Small Scale Digital Device Forensics Journal 2007;1(1): Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Morgan Kaufmann Publisher, Blythe P, Fridrich J. Secure digital camera. Digital Forensic Research Workshop, Baltimore, Aug Popescu AC, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing 2005;53(10): Swaminathan A, Wu M, Liu KJ-R. Non-intrusive forensic analysis of visual sensors using output images. IEEE Transactions of Information Forensics and Security 2007;2(1): Dirik AE, Sencar HT, Memon N. Digital single lens reflex camera identification from traces of sensor dust. IEEE Transactions on Information Forensics and Security 2008;3(3): Kurosawa K, Kuroki K, Saitoh N. CCD fingerprint method-identification of a video camera from videotaped images. Proc ICIP, October Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N. Methods for identification of images acquired with digital cameras. Proc SPIE Enabling Technologies for Law Enforcement and Security, 4232:505-12, 21 February Lukas J, Fridrich J, Goljan M. Determining digital image origin using sensor imperfections. Proc SPIE Electronic Imaging:249-60, San Jose, CA, January Lukas J, Fridrich J, Goljan M. Digital bullet scratches for images. Proc ICIP, Genova, Italy, September Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor noise. IEEE Transactions on Information Security and Forensics 2006;1(2): Mihcak MK, Kozintsev I, Ramchandran K. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. Proc IEEE Int. Conf. Acoustics, Speech, Signal Processing;6:3253-6, Phoenix, AZ, March Khanna N, Mikkilineni AK, Delp EJ. Forensic camera classification: verification of sensor pattern noise approach. Forensic Science Communications 2009;11(1).

10 28 Forensic Science Journal 2017; 16(1) Appendix A Fig. A-1 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-2 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-3 The tracing origin result of photos acquired by D with the Db8 filter.

11 Camera Identification Technique 29 Fig. A-4 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-5 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-6 The tracing origin result of photos acquired by D with the Wiener filter.

12 30 Forensic Science Journal 2017; 16(1) Fig. A-7 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-8 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-9 The tracing origin result of photos acquired by D with the Db8 filter.

13 Camera Identification Technique 31 Fig. A-10 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-11 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-12 The tracing origin result of photos acquired by D with the Wiener filter.

14 32 Forensic Science Journal 2017; 16(1) Fig. A-13 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-14 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-15 The tracing origin result of photos acquired by D with the Db8 filter.

15 Camera Identification Technique 33 Fig. A-16 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-17 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-18 The tracing origin result of photos acquired by D with the Wiener filter.

16 34 Forensic Science Journal 2017; 16(1) Fig. A-19 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-20 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-21 The tracing origin result of photos acquired by D with the Db8 filter.

17 Camera Identification Technique 35 Fig. A-22 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-23 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-24 The tracing origin result of photos acquired by D with the Wiener filter.

18 36 Forensic Science Journal 2017; 16(1) Fig. A-25 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-26 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-27 The tracing origin result of photos acquired by D with the Db8 filter.

19 Camera Identification Technique 37 Fig. A-28 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-29 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-30 The tracing origin result of photos acquired by D with the Wiener filter.

20 38 Forensic Science Journal 2017; 16(1) Fig. A-31 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-32 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-33 The tracing origin result of photos acquired by D with the Db8 filter.

21 Camera Identification Technique 39 Fig. A-34 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-35 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-36 The tracing origin result of photos acquired by D with the Wiener filter.

22 40 Forensic Science Journal 2017; 16(1) Appendix B Fig. B-1 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 550KL. Fig. B-2 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 551ML1. Fig. B-3 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 551ML2.

23 Camera Identification Technique 41 Fig. B-4 The tracing origin result of photos acquired by HTC Butterfly X920D. Fig. B-5 The tracing origin result of photos acquired by Oppo R7SF. Fig. B-6 The tracing origin result of photos acquired by Sony Xperia Z5.

24 42 Forensic Science Journal 2017; 16(1) Fig. B-7 The tracing origin result of photos acquired by Sony Xperia Z5P.

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of

More information

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L. A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, 138632,

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

Forensic Classification of Imaging Sensor Types

Forensic Classification of Imaging Sensor Types Forensic Classification of Imaging Sensor Types Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a,edwardj.delp a a School of Electrical and Computer Engineering b School of

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Survey On Passive-Blind Image Forensics

Survey On Passive-Blind Image Forensics Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

Scanner Identification Using Sensor Pattern Noise

Scanner Identification Using Sensor Pattern Noise Scanner Identification Using Sensor Pattern Noise Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer Engineering b School

More information

Fragile Sensor Fingerprint Camera Identification

Fragile Sensor Fingerprint Camera Identification Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera

More information

Open Set Source Camera Attribution

Open Set Source Camera Attribution Open Set Source Camera Attribution Filipe de O. Costa Institute of Computing University of Campinas (UNICAMP) Campinas, São Paulo, Brazil filipe.costa@students.ic.unicamp.br Michael Eckmann Dept. of Mathematics

More information

arxiv: v1 [cs.cv] 15 Mar 2017

arxiv: v1 [cs.cv] 15 Mar 2017 SOURCE CAMERA IDENTIFICATION BASED ON CONTENT-ADAPTIVE FUSION NETWORK Pengpeng Yang, Wei Zhao, Rongrong Ni, and Yao Zhao arxiv:1703.04856v1 [cs.cv] 15 Mar 2017 Institute of Information Science, & Beijing

More information

Camera identification by grouping images from database, based on shared noise patterns

Camera identification by grouping images from database, based on shared noise patterns Camera identification by grouping images from database, based on shared noise patterns Teun Baar, Wiger van Houten, Zeno Geradts Digital Technology and Biometrics department, Netherlands Forensic Institute,

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

Source Camera Model Identification Using Features from contaminated Sensor Noise

Source Camera Model Identification Using Features from contaminated Sensor Noise Source Camera Model Identification Using Features from contaminated Sensor Noise Amel TUAMA 2,3, Frederic COMBY 2,3, Marc CHAUMONT 1,2,3 1 NÎMES UNIVERSITY, F-30021 Nîmes Cedex 1, France 2 MONTPELLIER

More information

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,

More information

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018

More information

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Camera Model Identification Framework Using An Ensemble of Demosaicing Features Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu

More information

Automatic source camera identification using the intrinsic lens radial distortion

Automatic source camera identification using the intrinsic lens radial distortion Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of

More information

Survey on Source Camera Identification Using SPN with PRNU

Survey on Source Camera Identification Using SPN with PRNU Survey on Source Camera Identification Using SPN with PRNU Prof. Kapil Tajane, Tanaya Salunke, Pratik Bhavsar, Shubham Bodhe Computer Department Pimpri Chinchwad College of Engeering, Akurdi ABSTRACT Retrieving

More information

Exposing Image Forgery with Blind Noise Estimation

Exposing Image Forgery with Blind Noise Estimation Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Faculty of Computer Science Institute of Systems Architecture, Privacy and Data Security esearch roup Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Electronic Imaging 2010

More information

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

TECHNICAL DOCUMENTATION

TECHNICAL DOCUMENTATION TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification

More information

Source Camera Identification Forensics Based on Wavelet Features

Source Camera Identification Forensics Based on Wavelet Features Source Camera Identification Forensics Based on Wavelet Features Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng, China IIH-MSP-29 September 13, 29 Outline Introduction Image features based identification

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts Riccardo Satta and Pasquale Stirparo,2 Institute for the Protection and Security of the Citizen Joint

More information

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick

More information

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence

More information

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier Journal of Information Systems and Telecommunication, Vol. 1, No. 4, October - December 2013 233 Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM

More information

GIVEN the fast and widespread penetration of multimedia

GIVEN the fast and widespread penetration of multimedia IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008 539 Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust Ahmet Emir Dirik, Husrev Taha Sencar,

More information

Digital Image Authentication from Thumbnails

Digital Image Authentication from Thumbnails Digital Image Authentication from Thumbnails Eric Kee and Hany Farid Department of Computer Science, Dartmouth College, Hanover NH 3755, USA ABSTRACT We describe how to exploit the formation and storage

More information

Smartphone image acquisition forensics using sensor fingerprint

Smartphone image acquisition forensics using sensor fingerprint IET Computer Vision Research Article Smartphone image acquisition forensics using sensor fingerprint ISSN 1751-9632 Received on 1st August 2014 Revised on 26th October 2014 Accepted on 24th November 2014

More information

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the

More information

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot 24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and

More information

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics Colour-Decoupled Photo Response Non-Uniformity for Digital mage Forensics Chang-Tsun Li 1 and Yue Li 2 1 Department of Computer Science, University of arwick, Coventry CV4 7AL, UK c-t.li@warwick.ac.uk

More information

Chapter 2-Digital Components

Chapter 2-Digital Components Chapter 2-Digital Components What Makes Digital Cameras Work? This is how the D-SLR (Digital Single Lens Reflex) Camera works. The sensor This is the light sensitive part of your camera There are two basic

More information

Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection

Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection Peter Meerwald and Andreas Uhl University of Salzburg, Dept. of Computer Sciences, Jakob-Haringer-Str. 2, A-20 Salzburg, Austria

More information

Methods for identification of images acquired with Digital cameras

Methods for identification of images acquired with Digital cameras Header for SPIE use Methods for identification of images acquired with Digital cameras Zeno J Geradts(a), Jurrien Bijhold(a), Martijn Kieft(a), Kenji Kurosawa(b), Kenro Kuroki(b), Naoki Saitoh(b) (a) Netherlands

More information

A survey of forensic characterization methods for physical devices 5

A survey of forensic characterization methods for physical devices 5 digital investigation 3S (2006) S17 S28 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin A survey of forensic characterization methods for physical devices 5 Nitin Khanna

More information

CERIAS Tech Report Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance

CERIAS Tech Report Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance CERIAS Tech Report 29-38 Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 4797-286

More information

Footwear & Tire Tread Photography A comparison of digital resolution vs. 35mm film

Footwear & Tire Tread Photography A comparison of digital resolution vs. 35mm film Steve Everist, King County Sheriff s Office, WA William Fluit, Sioux Falls Police Department, SD Forensic Photography III, Michael Brooks, January 29, 2007 Footwear & Tire Tread Photography A comparison

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

PRIOR IMAGE JPEG-COMPRESSION DETECTION

PRIOR IMAGE JPEG-COMPRESSION DETECTION Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION

More information

Can We Trust Digital Image Forensics?

Can We Trust Digital Image Forensics? Can We Trust Digital Image Forensics? ABSTRACT Thomas Gloe Technische Universität Dresden Institute for System Architecture 162 Dresden, Germany thomas.gloe@inf.tu-dresden.de Antje Winkler Technische Universität

More information

Source Camera Identification Using Enhanced Sensor Pattern Noise

Source Camera Identification Using Enhanced Sensor Pattern Noise T-IFS-011-009 1 Source Camera Identification Using Enhanced Sensor Pattern Noise Chang-Tsun L Member, IEEE Abstract Sensor pattern noises (SPNs), extracted from digital images to serve as the fingerprints

More information

Canon Digital Manual Camera Price In India Below 5000 >>>CLICK HERE<<<

Canon Digital Manual Camera Price In India Below 5000 >>>CLICK HERE<<< Canon Digital Manual Camera Price In India Below 5000 Camera under Rs. 5000 in India as on 2015 Jul 05th. Currently 22 Cameras are available in the Price Range of Rs. 3344 to Rs. 5000. Only Best. Buy Canon

More information

Original citation: Li, C-T. (2012). Color-Decoupled Photo Response Non-Uniformity for Digital mage Forensics. EEE Transactions on Circuits and Systems for Video Technology, 22(2), pp. 260-271 Permanent

More information

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

A Novel Multi-size Block Benford s Law Scheme for Printer Identification A Novel Multi-size Block Benford s Law Scheme for Printer Identification Weina Jiang 1, Anthony T.S. Ho 1, Helen Treharne 1, and Yun Q. Shi 2 1 Dept. of Computing, University of Surrey Guildford, GU2 7XH,

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

Implementation of the Likelihood Ratio framework for camera identification based

Implementation of the Likelihood Ratio framework for camera identification based Implementation of the Likelihood Ratio framework for camera identification based on sensor noise patterns Wiger van Houten 1, Ivo Alberink, Zeno Geradts Criminal Investigation Unit North, Digital Evidence

More information

Forensic Hash for Multimedia Information

Forensic Hash for Multimedia Information Forensic Hash for Multimedia Information Wenjun Lu, Avinash L. Varna and Min Wu Department of Electrical and Computer Engineering, University of Maryland, College Park, U.S.A email: {wenjunlu, varna, minwu}@eng.umd.edu

More information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2 Based on Cepstral Mixed Features 12 School of Information and Communication Engineering,Dalian University of Technology,Dalian, 116024, Liaoning, P.R. China E-mail:zww110221@163.com Xiangwei Kong, Xingang

More information

Using sensor noise to identify low resolution compressed videos from YouTube

Using sensor noise to identify low resolution compressed videos from YouTube Using sensor noise to identify low resolution compressed videos from YouTube Wiger van Houten and Zeno Geradts Abstract The Photo Response Non-Uniformity acts as a digital fingerprint that can be used

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

Forensic Image and Video Processing. Dallas, AAFS, 17 February 2004.

Forensic Image and Video Processing. Dallas, AAFS, 17 February 2004. Workshop Forensic Image and Video Processing Dallas, AAFS, 17 February 2004. Outline 08.30 09.00 Introduction by Zeno Geradts Netherlands Forensic Institute 09.00 10.00 Photogrammetry by Richard Vorderbruegge

More information

From Image to Sensor: Comparative Evaluation of Multiple PRNU Estimation Schemes for Identifying Sensors from NIR Iris Images

From Image to Sensor: Comparative Evaluation of Multiple PRNU Estimation Schemes for Identifying Sensors from NIR Iris Images S. Banerjee and A. Ross, "From Image to Sensor: Comparative Evaluation of Multiple PRU Estimation Schemes for Identifying Sensors from IR Iris Images," 5th International Workshop on Biometrics and Forensics

More information

A Study of Slanted-Edge MTF Stability and Repeatability

A Study of Slanted-Edge MTF Stability and Repeatability A Study of Slanted-Edge MTF Stability and Repeatability Jackson K.M. Roland Imatest LLC, 2995 Wilderness Place Suite 103, Boulder, CO, USA ABSTRACT The slanted-edge method of measuring the spatial frequency

More information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian

More information

According to the proposed AWB methods as described in Chapter 3, the following

According to the proposed AWB methods as described in Chapter 3, the following Chapter 4 Experiment 4.1 Introduction According to the proposed AWB methods as described in Chapter 3, the following experiments were designed to evaluate the feasibility and robustness of the algorithms.

More information

Image De-Noising Using a Fast Non-Local Averaging Algorithm

Image De-Noising Using a Fast Non-Local Averaging Algorithm Image De-Noising Using a Fast Non-Local Averaging Algorithm RADU CIPRIAN BILCU 1, MARKKU VEHVILAINEN 2 1,2 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720, Tampere FINLAND

More information

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj

More information

89% Gold Award. Sep 14, 2016 Oct 16, Aug 25, 2016 Jul 25, 2017 Oct 25, Mid-size SLR Mid-size SLR SLR-style mirrorless

89% Gold Award. Sep 14, 2016 Oct 16, Aug 25, 2016 Jul 25, 2017 Oct 25, Mid-size SLR Mid-size SLR SLR-style mirrorless Side by side 3 cameras compared Canon EOS 5D Mark IV Nikon D850 Sony Alpha 7R III Basic Information Review / Preview 87% Gold Award 89% Gold Award Sep 14, 2016 Oct 16, 2017 Announced Aug 25, 2016 Jul 25,

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

WITH the rapid development of image processing technology,

WITH the rapid development of image processing technology, 480 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 JPEG Error Analysis and Its Applications to Digital Image Forensics Weiqi Luo, Member, IEEE, Jiwu Huang, Senior

More information

Canon Digital-Ixus V Jun 2001

Canon Digital-Ixus V Jun 2001 L i s t o f C a m e r a s - D C B A list of digital cameras which can be used in conjunction with Swarovski Optik's ATS and STS telescopes using the Swarovski Optik digital camera adapter DCB. Canon Digital-Ixus

More information

Camera Image Processing Pipeline

Camera Image Processing Pipeline Lecture 13: Camera Image Processing Pipeline Visual Computing Systems Today (actually all week) Operations that take photons hitting a sensor to a high-quality image Processing systems used to efficiently

More information

ABC: Enabling Smartphone Authentication with Built-in Camera

ABC: Enabling Smartphone Authentication with Built-in Camera ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1 Camera Identification: Hardware Distortion Manufacturing

More information

Exposing Digital Forgeries from JPEG Ghosts

Exposing Digital Forgeries from JPEG Ghosts 1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person

More information

>--- UnSorted Tag Reference [ExifTool -a -m -u -G -sort ] ExifTool Ver: 10.07

>--- UnSorted Tag Reference [ExifTool -a -m -u -G -sort ] ExifTool Ver: 10.07 From Image File C:\AEB\RAW_Test\_MG_4376.CR2 Total Tags = 433 (Includes Composite Tags) and Duplicate Tags >------ SORTED Tag Position >--- UnSorted Tag Reference [ExifTool -a -m -u -G -sort ] ExifTool

More information

VISUAL sensor technologies have experienced tremendous

VISUAL sensor technologies have experienced tremendous IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 1, MARCH 2007 91 Nonintrusive Component Forensics of Visual Sensors Using Output Images Ashwin Swaminathan, Student Member, IEEE, Min

More information

Camera Image Processing Pipeline: Part II

Camera Image Processing Pipeline: Part II Lecture 14: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements

More information

Windows. DxO Optics Pro v8.5 Release notes. System requirements

Windows. DxO Optics Pro v8.5 Release notes. System requirements DxO Optics Pro v8.5 Release notes Windows System requirements Processor: o Minimum: Intel Core 2 Duo, AMD Athlon 64 X2 or higher. o Recommended: Intel Core i5, AMD Phenom II X4 or higher. RAM: o Minimum:

More information

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,

More information

Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns

Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns Law, Probability and Risk (2011) 10, 149 159 doi:10.1093/lpr/mgr006 Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns WIGER VAN HOUTEN Digital Evidence

More information

Kent Academic Repository

Kent Academic Repository Kent Academic Repository Full text document (pdf Citation for published version Sandoval Orozco, A.L. and Arenas, Gonzalez and Rosales, Corripio and Garcia Villalba, L.J. and Hernandez-Castro, Julio C.

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret

More information

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns

More information

S SNR 10log. peak peak MSE. 1 MSE I i j

S SNR 10log. peak peak MSE. 1 MSE I i j Noise Estimation Using Filtering and SVD for Image Tampering Detection U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur Walchand College of Engineering, Sangli

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012 A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become

More information

Canon Digital Manual Camera Models With Price In India

Canon Digital Manual Camera Models With Price In India Canon Digital Manual Camera Models With Price In India Amazon.in: Buy camera lenses online at low price in india at More Buying Choices, 13 offers from 8,900.00, (30), See newer model of this item Canon

More information

Image acquisition. In both cases, the digital sensing element is one of the following: Line array Area array. Single sensor

Image acquisition. In both cases, the digital sensing element is one of the following: Line array Area array. Single sensor Image acquisition Digital images are acquired by direct digital acquisition (digital still/video cameras), or scanning material acquired as analog signals (slides, photographs, etc.). In both cases, the

More information

Camera Image Processing Pipeline: Part II

Camera Image Processing Pipeline: Part II Lecture 13: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements

More information

USING SENSOR DIRT FOR TOOLMARK ANALYSIS OF DIGITAL PHOTOGRAPHS

USING SENSOR DIRT FOR TOOLMARK ANALYSIS OF DIGITAL PHOTOGRAPHS Chapter 16 USING SENSOR DIRT FOR TOOLMARK ANALYSIS OF DIGITAL PHOTOGRAPHS Martin Olivier Abstract Dust particles that collect on the image sensors of digital cameras oftenleavemarksonthepicturestakenwiththesecameras.

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Prices of digital cameras

Prices of digital cameras Prices of digital cameras The August 2012 issue of Consumer Reports included a report on digital cameras. The magazine listed 60 cameras, all of which were recommended by them, divided into six categories

More information

SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES. Received August 2008; accepted October 2008

SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES. Received August 2008; accepted October 2008 ICIC Express Letters ICIC International c 2008 ISSN 1881-803X Volume 2, Number 4, December 2008 pp. 409 414 SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

Blind Verification of Digital Image Originality: A Statistical Approach

Blind Verification of Digital Image Originality: A Statistical Approach IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 9, SEPTEMBER 2013 1531 Blind Verification of Digital Image Originality: A Statistical Approach Babak Mahdian, Radim Nedbal, and Stanislav

More information

Mobile Camera Source Identification with SVD

Mobile Camera Source Identification with SVD Mobile Camera Source Identification with SVD A-R Soobhany, KP Lam, P Fletcher, DJ Collins Research Institute for the Environment, Physical Sciences and Applied Mathematics Keele University Keele, Staffordshire,

More information

Does Nikon Coolpix L310 Have Manual Mode

Does Nikon Coolpix L310 Have Manual Mode Does Nikon Coolpix L310 Have Manual Mode Recent Nikon Coolpix L310 questions, problems & answers. Free expert Coolpix L310 Manual Nikon It always wants to format cards we have been using. Product Manual

More information

Digital Imaging with the Nikon D1X and D100 cameras. A tutorial with Simon Stafford

Digital Imaging with the Nikon D1X and D100 cameras. A tutorial with Simon Stafford Digital Imaging with the Nikon D1X and D100 cameras A tutorial with Simon Stafford Contents Fundamental issues of Digital Imaging Camera controls Practical Issues Questions & Answers (hopefully!) Digital

More information

Michigan Technological University. Characterization of Unpaved Road Condition Through the Use of Remote Sensing

Michigan Technological University. Characterization of Unpaved Road Condition Through the Use of Remote Sensing Michigan Technological University Characterization of Unpaved Road Condition Through the Use of Remote Sensing Deliverable 4-A: Sensor Selection for use in Remote Sensing the Phenomena of Unpaved Road

More information

Best Camera Manual Lens For Canon Eos 60d Twin

Best Camera Manual Lens For Canon Eos 60d Twin Best Camera Manual Lens For Canon Eos 60d Twin Buy Canon EOS 60D DSLR Camera with 18-200mm Lens features 18 MP Along with its manual controls, the EOS 60D allows for full use of Canon EF and EF-S Each

More information

Sony Cybershot Manual 12.1 Megapixel Digital Camera Price In Pakistan

Sony Cybershot Manual 12.1 Megapixel Digital Camera Price In Pakistan Sony Cybershot Manual 12.1 Megapixel Digital Camera Price In Pakistan Because our price on this item is lower than the manufacturer's suggested retail Sony DSC- WX300/B 18.2 MP Digital Camera with 20x

More information

Exposing Image Splicing with Inconsistent Local Noise Variances

Exposing Image Splicing with Inconsistent Local Noise Variances Exposing Image Splicing with Inconsistent Local Noise Variances Xunyu Pan Xing Zhang Siwei Lyu Computer Science Department University at Albany, State University of New York {xzhang5,xypan,slyu@albany.edu

More information